US 11,657,165 B2
Cryptography module and method for operating same
Juergen Schramm, Bietigheim-Bissingen (DE); Alexander Meurer, Bochum (DE); Ramona Jung, Stuttgart (DE); Christoph Lenz, Backnang (DE); Andreas Weber, Weissach (DE); Florian Ziegler, Stuttgart (DE); Frederic Stumpf, Leonberg (DE); and Ilias Sagar, Stuttgart (DE)
Assigned to ROBERT BOSCH GMBH, Stuttgart (DE)
Appl. No. 17/55,035
Filed by Robert Bosch GmbH, Stuttgart (DE)
PCT Filed May 22, 2019, PCT No. PCT/EP2019/063189
§ 371(c)(1), (2) Date Nov. 12, 2020,
PCT Pub. No. WO2019/242972, PCT Pub. Date Dec. 26, 2019.
Claims priority of application No. 102018209965.0 (DE), filed on Jun. 20, 2018; application No. 102018211752.7 (DE), filed on Jul. 13, 2018; and application No. 102018213618.1 (DE), filed on Aug. 13, 2018.
Prior Publication US 2021/0216477 A1, Jul. 15, 2021
Int. Cl. G06F 21/60 (2013.01); G06F 12/14 (2006.01); G06F 21/57 (2013.01); G06F 21/64 (2013.01); G06F 21/79 (2013.01); H04L 9/32 (2006.01); G06F 9/4401 (2018.01); G06F 21/51 (2013.01); G06F 21/56 (2013.01)
CPC G06F 21/602 (2013.01) [G06F 9/4401 (2013.01); G06F 12/1408 (2013.01); G06F 21/51 (2013.01); G06F 21/567 (2013.01); G06F 21/57 (2013.01); G06F 21/575 (2013.01); G06F 21/64 (2013.01); G06F 21/79 (2013.01); H04L 9/3242 (2013.01); G06F 2212/1052 (2013.01); G06F 2221/03 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A cryptography module for a computing device, the cryptography module configured to:
perform a check operation that produces a result, the checking operation checking at least one memory area of a memory device which is accessible by the computing device; and
store the result at least temporarily, wherein the result indicates whether a change has occurred in a content of the at least one memory area on account of a manipulation or an error, and wherein the cryptography module checks multiple memory areas of the memory device, the cryptography module checking the multiple memory areas at least occasionally in a random or pseudorandom sequence, and wherein the cryptography module is configured to carry out the check of the at least one memory area using a cypher-based message authentication code (CMAC).